Deck 15: Evaluating Electronic Information

Full screen (f)
exit full mode
Question
The Internet epitomizes the concept of caveat lector-reader beware.
Use Space or
up arrow
down arrow
to flip the card.
Question
The first page, or about page, of a Web site indicates how the site is organized and what options are available.
Question
Software programs can be installed on a computer or network that automatically block access to user-specified sites or to sites with specified content.
Question
Search engines are programs written to query and retrieve information stored in a database.
Question
Sponsored sites provide balanced and impartial information.
Question
Shareware is the unauthorized copying of software.
Question
Pirated software is usually distributed on an honor system and is free for an evaluation period.
Question
Internet resources used in reports must be cited, which means giving credit to any information you include in a report that is not your original thought.
Question
If someone publishes information about another person or organization and it is not true, they can be sued for libel and forced to pay compensation for any damage they caused.
Question
Links that are no longer active are called "____."

A) transparent links
B) legacy links
C) dead links
D) dead dogs
Question
If the domain portion of a Web site is ____, the site is used for educational or research information.

A) .edu
B) .gov
C) .org
D) .mil
Question
If the domain portion of a Web site is ____, the site is used for military branches.

A) .edu
B) .gov
C) .org
D) .mil
Question
If the domain portion of a Web site is ____, the site is used for government resources.

A) .edu
B) .gov
C) .mil
D) .org
Question
A very important consideration of an effective site is its ____, which refers to the age of the information, how long it has been posted, and how often it is updated.

A) citation
B) relevance
C) proof
D) currency
Question
____ is the ability to use links to move through a site.

A) Navigation
B) Hopping
C) Researching
D) Storyboarding
Question
Which of the following is NOT a feature of properly used links in a Web site?

A) grouped logically
B) easy to identify
C) in blue type
D) pertinent to the subject of the original page
Question
A ____ site is a site that has paid the search engine a fee in exchange for being listed in the "Sponsored Sites" section on many of their pages.

A) sponsored
B) biased
C) misleading
D) portal
Question
____ is the exclusive right, granted by law for a certain number of years, to make and dispose of literary, musical, or artistic work.

A) Copyright
B) Trademarking
C) Patents
D) Public domain
Question
Please use the figure below to answer the following two questions.
FIGURE 15-1
<strong>Please use the figure below to answer the following two questions. FIGURE 15-1    -Figure 15-1 shows a Google search with Sponsored Links. How do companies get their entries listed in the sponsored site area?</strong> A) They pay for placement B) They write good content on their site C) either a. or b. D) neither a. nor b. <div style=padding-top: 35px>

-Figure 15-1 shows a Google search with Sponsored Links. How do companies get their entries listed in the sponsored site area?

A) They pay for placement
B) They write good content on their site
C) either a. or b.
D) neither a. nor b.
Question
Please use the figure below to answer the following two questions.
FIGURE 15-1
<strong>Please use the figure below to answer the following two questions. FIGURE 15-1    -When looking at the Sponsored Links in Figure 15-1, the companies appear to be sharing ____.</strong> A) unbiased information B) advertising information C) both a. and b. D) neither a. nor b. <div style=padding-top: 35px>

-When looking at the Sponsored Links in Figure 15-1, the companies appear to be sharing ____.

A) unbiased information
B) advertising information
C) both a. and b.
D) neither a. nor b.
Question
A company's logo or other graphic information on a Web site may be protected as a ____.

A) trademark
B) patent
C) either a. or b.
D) neither a. nor b.
Question
Processes and business methods may be protected by ____, which guarantee the inventor exclusive copyright to the process or method for a certain time period.

A) trademarks
B) patents
C) either a. or b.
D) neither a. nor b.
Question
If copyright protection has lapsed on certain material, then it is deemed to be in the ____ and is available for anyone to copy.

A) private domain
B) public domain
C) literary domain
D) library domain
Question
Every page on the Internet was designed and created by someone. Today, that someone is called a Web ____.

A) designer
B) builder
C) helper
D) aide
Question
____ are stories that at one time could have been partially true, but have grown from constant retelling into a mythical yarn.

A) Rural legends
B) Urban legends
C) Rural hoaxes
D) Urban hoaxes
Question
One of the more popular Web sites displaying information about myths and hoaxes is the ____ Web site.

A) StopMyths
B) CatchMyths
C) Emyths
D) Vmyths
Question
Criminal problems that the Internet has been fueling include ____.

A) sexual advances made to minors
B) rumors to manipulate stock prices
C) anonymous threats
D) all of the above
Question
When criminals gather personal information, acquire credit, and conduct transactions using false identities it is called ____.

A) Money theft
B) Identity theft
C) Money-lifting
D) Identity-lifting
Question
Nancy has started her own flower delivery business. She has created a logo and a unique delivery process. Please answer the questions below.

-Nancy wants to make sure that no one copies her logo and uses it for their own business. To protect her logo from being copied, Nancy would pursue a ____.

A) trademark
B) patent
C) both a. or b.
D) neither a. nor b.
Question
Nancy has started her own flower delivery business. She has created a logo and a unique delivery process. Please answer the questions below.

-To protect her unique delivery process from being used by other companies, Nancy would pursue obtaining a ____.

A) trademark
B) patent
C) both a. and b.
D) neither a. nor b.
Question
Chase has been assigned the role of making sure all of the content on the company Web site is ethical and true. Please answer the two questions below.

-Chase finds two charts on his company's Web site that have been copied and pasted from the IBM site. IBM is not given credit for being the author of the charts. This is considered ____.

A) plagiarism
B) identity theft
C) patent infringement
D) all of the above
Question
Chase has been assigned the role of making sure all of the content on the company Web site is ethical and true. Please answer the two questions below.

-Chase also does some searches on Google to see if any hidden files can be accessed by the public. He finds a file listing all of the customers and their credit card numbers that can be accessed via Google. If someone uses this information to buy their Christmas presents it is considered to be ____.

A) urban theft
B) identity theft
C) a hoax
D) plagiarism
Question
A very important consideration of an effective site is its ____________________, which refers to the age of the information, how long it has been posted, and how often it is updated.
Question
____________________ is the exclusive right, granted by law for a certain number of years, to make and dispose of literary, musical, or artistic work.
Question
____________________ is the unauthorized copying of software.
Question
A(n) ____________________ is an attempt to deceive an audience into believing that something false is real.
Question
Navigation is the ability to use links to move through a site. _________________________
Question
Processes and business methods may be protected by trademarks, which guarantee the inventor exclusive copyright to the process or method for a certain time period. _________________________
Question
If copyright protection has lapsed on certain material, then it is deemed to be in the Internet domain and is available for anyone to copy. _________________________
Question
Just because information is obtained from an Internet site does not mean that someone can copy it and claim it as his or her own, even noncopyrighted information. That's plagiarism. _________________________
Question
Please identify the letter of the choice that best matches the numbered definitions below.

-Guarantees the inventor exclusive copyright to the process or method for a certain time period

A) hoax
B) urban legends
C) trademark
D) patent
E) copyright
Question
Please identify the letter of the choice that best matches the numbered definitions below.

-Exclusive right, granted by law for a certain number of years, to make and dispose of literary, musical, or artistic work

A) hoax
B) urban legends
C) trademark
D) patent
E) copyright
Question
Please identify the letter of the choice that best matches the numbered definitions below.

-Exclusive right to make and use visual or commercial images rather than text or intellectual property

A) hoax
B) urban legends
C) trademark
D) patent
E) copyright
Question
Please identify the letter of the choice that best matches the numbered definitions below.

-Stories that at one time could have been partially true, but have grown from constant retelling into a mythical yarn

A) hoax
B) urban legends
C) trademark
D) patent
E) copyright
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/44
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 15: Evaluating Electronic Information
1
The Internet epitomizes the concept of caveat lector-reader beware.
True
2
The first page, or about page, of a Web site indicates how the site is organized and what options are available.
False
3
Software programs can be installed on a computer or network that automatically block access to user-specified sites or to sites with specified content.
True
4
Search engines are programs written to query and retrieve information stored in a database.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
5
Sponsored sites provide balanced and impartial information.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
6
Shareware is the unauthorized copying of software.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
7
Pirated software is usually distributed on an honor system and is free for an evaluation period.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
8
Internet resources used in reports must be cited, which means giving credit to any information you include in a report that is not your original thought.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
9
If someone publishes information about another person or organization and it is not true, they can be sued for libel and forced to pay compensation for any damage they caused.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
10
Links that are no longer active are called "____."

A) transparent links
B) legacy links
C) dead links
D) dead dogs
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
11
If the domain portion of a Web site is ____, the site is used for educational or research information.

A) .edu
B) .gov
C) .org
D) .mil
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
12
If the domain portion of a Web site is ____, the site is used for military branches.

A) .edu
B) .gov
C) .org
D) .mil
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
13
If the domain portion of a Web site is ____, the site is used for government resources.

A) .edu
B) .gov
C) .mil
D) .org
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
14
A very important consideration of an effective site is its ____, which refers to the age of the information, how long it has been posted, and how often it is updated.

A) citation
B) relevance
C) proof
D) currency
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
15
____ is the ability to use links to move through a site.

A) Navigation
B) Hopping
C) Researching
D) Storyboarding
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
16
Which of the following is NOT a feature of properly used links in a Web site?

A) grouped logically
B) easy to identify
C) in blue type
D) pertinent to the subject of the original page
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
17
A ____ site is a site that has paid the search engine a fee in exchange for being listed in the "Sponsored Sites" section on many of their pages.

A) sponsored
B) biased
C) misleading
D) portal
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
18
____ is the exclusive right, granted by law for a certain number of years, to make and dispose of literary, musical, or artistic work.

A) Copyright
B) Trademarking
C) Patents
D) Public domain
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
19
Please use the figure below to answer the following two questions.
FIGURE 15-1
<strong>Please use the figure below to answer the following two questions. FIGURE 15-1    -Figure 15-1 shows a Google search with Sponsored Links. How do companies get their entries listed in the sponsored site area?</strong> A) They pay for placement B) They write good content on their site C) either a. or b. D) neither a. nor b.

-Figure 15-1 shows a Google search with Sponsored Links. How do companies get their entries listed in the sponsored site area?

A) They pay for placement
B) They write good content on their site
C) either a. or b.
D) neither a. nor b.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
20
Please use the figure below to answer the following two questions.
FIGURE 15-1
<strong>Please use the figure below to answer the following two questions. FIGURE 15-1    -When looking at the Sponsored Links in Figure 15-1, the companies appear to be sharing ____.</strong> A) unbiased information B) advertising information C) both a. and b. D) neither a. nor b.

-When looking at the Sponsored Links in Figure 15-1, the companies appear to be sharing ____.

A) unbiased information
B) advertising information
C) both a. and b.
D) neither a. nor b.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
21
A company's logo or other graphic information on a Web site may be protected as a ____.

A) trademark
B) patent
C) either a. or b.
D) neither a. nor b.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
22
Processes and business methods may be protected by ____, which guarantee the inventor exclusive copyright to the process or method for a certain time period.

A) trademarks
B) patents
C) either a. or b.
D) neither a. nor b.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
23
If copyright protection has lapsed on certain material, then it is deemed to be in the ____ and is available for anyone to copy.

A) private domain
B) public domain
C) literary domain
D) library domain
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
24
Every page on the Internet was designed and created by someone. Today, that someone is called a Web ____.

A) designer
B) builder
C) helper
D) aide
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
25
____ are stories that at one time could have been partially true, but have grown from constant retelling into a mythical yarn.

A) Rural legends
B) Urban legends
C) Rural hoaxes
D) Urban hoaxes
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
26
One of the more popular Web sites displaying information about myths and hoaxes is the ____ Web site.

A) StopMyths
B) CatchMyths
C) Emyths
D) Vmyths
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
27
Criminal problems that the Internet has been fueling include ____.

A) sexual advances made to minors
B) rumors to manipulate stock prices
C) anonymous threats
D) all of the above
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
28
When criminals gather personal information, acquire credit, and conduct transactions using false identities it is called ____.

A) Money theft
B) Identity theft
C) Money-lifting
D) Identity-lifting
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
29
Nancy has started her own flower delivery business. She has created a logo and a unique delivery process. Please answer the questions below.

-Nancy wants to make sure that no one copies her logo and uses it for their own business. To protect her logo from being copied, Nancy would pursue a ____.

A) trademark
B) patent
C) both a. or b.
D) neither a. nor b.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
30
Nancy has started her own flower delivery business. She has created a logo and a unique delivery process. Please answer the questions below.

-To protect her unique delivery process from being used by other companies, Nancy would pursue obtaining a ____.

A) trademark
B) patent
C) both a. and b.
D) neither a. nor b.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
31
Chase has been assigned the role of making sure all of the content on the company Web site is ethical and true. Please answer the two questions below.

-Chase finds two charts on his company's Web site that have been copied and pasted from the IBM site. IBM is not given credit for being the author of the charts. This is considered ____.

A) plagiarism
B) identity theft
C) patent infringement
D) all of the above
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
32
Chase has been assigned the role of making sure all of the content on the company Web site is ethical and true. Please answer the two questions below.

-Chase also does some searches on Google to see if any hidden files can be accessed by the public. He finds a file listing all of the customers and their credit card numbers that can be accessed via Google. If someone uses this information to buy their Christmas presents it is considered to be ____.

A) urban theft
B) identity theft
C) a hoax
D) plagiarism
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
33
A very important consideration of an effective site is its ____________________, which refers to the age of the information, how long it has been posted, and how often it is updated.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
34
____________________ is the exclusive right, granted by law for a certain number of years, to make and dispose of literary, musical, or artistic work.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
35
____________________ is the unauthorized copying of software.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
36
A(n) ____________________ is an attempt to deceive an audience into believing that something false is real.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
37
Navigation is the ability to use links to move through a site. _________________________
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
38
Processes and business methods may be protected by trademarks, which guarantee the inventor exclusive copyright to the process or method for a certain time period. _________________________
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
39
If copyright protection has lapsed on certain material, then it is deemed to be in the Internet domain and is available for anyone to copy. _________________________
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
40
Just because information is obtained from an Internet site does not mean that someone can copy it and claim it as his or her own, even noncopyrighted information. That's plagiarism. _________________________
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
41
Please identify the letter of the choice that best matches the numbered definitions below.

-Guarantees the inventor exclusive copyright to the process or method for a certain time period

A) hoax
B) urban legends
C) trademark
D) patent
E) copyright
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
42
Please identify the letter of the choice that best matches the numbered definitions below.

-Exclusive right, granted by law for a certain number of years, to make and dispose of literary, musical, or artistic work

A) hoax
B) urban legends
C) trademark
D) patent
E) copyright
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
43
Please identify the letter of the choice that best matches the numbered definitions below.

-Exclusive right to make and use visual or commercial images rather than text or intellectual property

A) hoax
B) urban legends
C) trademark
D) patent
E) copyright
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
44
Please identify the letter of the choice that best matches the numbered definitions below.

-Stories that at one time could have been partially true, but have grown from constant retelling into a mythical yarn

A) hoax
B) urban legends
C) trademark
D) patent
E) copyright
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 44 flashcards in this deck.